lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 10 Mar 2022 10:46:08 +0000 (GMT) From: "Maciej W. Rozycki" <macro@...am.me.uk> To: Thomas Bogendoerfer <tsbogend@...ha.franken.de> cc: linux-mips@...r.kernel.org, linux-kernel@...r.kernel.org, arnd@...nel.org Subject: Re: [PATCH] MIPS: Handle address errors for accesses above CPU max virtual user address On Tue, 22 Feb 2022, Thomas Bogendoerfer wrote: > Address errors have always been treated as unaliged accesses and handled > as such. But address errors are also issued for illegal accesses like > user to kernel space or accesses outside of implemented spaces. This > change implements Linux exception handling for accesses to the illegal > space above the CPU implemented maximum virtual user address and the > MIPS 64bit architecture maximum. With this we can now use a fixed value > for the maximum task size on every MIPS CPU and get a more optimized > access_ok(). Decades ago I had a patch to handle this with CPU-specific limits, which in the end I have not submitted for one reason or another. I guess we didn't have what is `cpu_vmbits' nowadays. I'll see if I can dig it out and check if there's anything interesting there we might also require. Overall good work, and I'm rather embarassed we have gone so far without it. Thanks! Maciej
Powered by blists - more mailing lists